[原文]GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.

-
漏洞信息 (F32282)

Bugtraq Security Systems Security Advisory - Multiple vulnerabilities have been discovered in the Applied Watch Command Center IDS. Two exploits have been released to demonstrate these flaws. The first, appliedsnatch.c, allows a remote attacker to add a user to the console without having to authenticate to the system. The second, addrule.c, allows a remote attacker to add custom IDS alerts to all sensor nodes in a network, enabling a human denial-of-service attack by making good packets look bad.

-
漏洞信息

-
漏洞描述

GnuPG has a serious flaw that compromises any ElGamal key used for signing or encrypting material. When GnuPG creates ElGamal sign+encrypt keys (type 20), it does so in a cryptographically weak way. This can be exploited to compromise the private key.

-
时间线

公开日期:
2003-11-27

发现日期:
Unknow

利用日期:Unknow

解决日期:Unknow

-
解决方案

Upgrade to version 1.2.3 or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the patch provided by the vendor, which is applied to vulnerable 1.2.3 distributions.

-
漏洞讨论

GnuPG is prone to a vulnerability in the implementation of ElGamal signing keys that could compromise private keys. The vendor has stated that this vulnerability could be practically exploited to compromise private keys in seconds. This vulnerability was introduced as of version 1.0.2 of GnuPG.

-
漏洞利用

The vendor has reported that there is a practical attack which will compromise private keys and all ElGamal signing keys that have been generated with vulnerable versions of the software should be considered compromised.

-
解决方案

Debian has released an updated advisory (DSA 429-2) and fixes to address this issue. Please see the referenced advisory for links to fixed packages.

Red Hat has released an advisory (RHSA-2003:390-01) that includes fixes for this issue. Please see the attached advisory for details on obtaining and applying fixes.

Conectiva has released an advisory that includes fixes for this issue.

Mandrake has released an advisory and fixes for this issue.

SuSE has released an advisory (SuSE-SA:2003:048) that includes fixes for this issue. Please see the attached advisory for details on obtaining and applying fixes.

The vendor has released a patch for this issue that can be applied to version 1.2.3. This fix will also be included in the next version.

Gentoo has released an advisory (200312-05) to address this issue. All Gentoo Linux systems should be updated to use gnupg-1.2.3-r5 or higher as follows: